Financial fraud rarely occurs in isolation. Individual records — a name, an email address, a device ID — often appear clean when examined independently. The pattern only becomes visible when you map the relationships between entities across multiple data sources simultaneously.
This analysis models a synthetic fraud network to demonstrate graph-based investigative methodology: the same approach used in physical security intelligence operations to detect shared identities, coordinated account abuse, and bust-out fraud schemes before financial damage escalates.
Core question: Given a set of accounts, devices, emails, and persons — which relationships indicate coordinated fraud, and which investigative leads should be prioritized first?
01
Shared Device Across Three Distinct Identities
HIGH RISK
Device A9F2 (iPhone 13, unique IMEI) was registered across the profiles of Marcus Webb, Sandra Osei, and James Frio — three supposedly independent applicants. A single device appearing across multiple identities is a primary indicator of synthetic identity fraud or account takeover. This device constitutes the central node connecting what initially appeared to be unrelated subjects.
02
Bust-Out Transaction Loop: Webb → Acct #8812 → Holt
HIGH RISK
Account #8812, opened under Marcus Webb, received a $4,200 cash advance within 6 hours of account opening. The full balance was transferred to an external account linked to Renee Holt within 24 hours. This pattern — rapid advance followed by immediate transfer — repeated across three billing cycles and is consistent with bust-out fraud coordination between connected actors.
03
Duplicate Application Pattern: 94% Data Match
HIGH RISK
Account #3341 (Sandra Osei) was submitted with application data 94% identical to Account #8812 (Marcus Webb) — differentiated only by a single SSN suffix digit. Address, phone, employer, and income figures were identical. This indicates either the same actor submitting under multiple identities, or a coordinated ring using templated application data.
The analytical methodology demonstrated here translates directly to physical security intelligence operations. The JSOC coordinates across fraud investigations, physical access control, and threat intelligence — all domains where entity relationships are the primary investigative surface.
FRAUD OPERATIONS
Identifying coordinated account abuse, shared device clusters, and transaction loops that indicate organized fraud rings — supporting JSOC fraud intelligence and investigative lead generation.
PHYSICAL ACCESS CONTROL
The same graph model applies to access log analysis — mapping which badge IDs, door events, and personnel appear in anomalous proximity to security incidents or sensitive locations.
INSIDER RISK
Connecting access patterns, system activity, and personnel relationships to surface behavioral anomalies that may indicate insider threat before escalation occurs.
THREAT BRIEFINGS
Producing clear, visual intelligence products from complex multi-source data — enabling security leadership to make fast, informed decisions with high situational awareness.